Multi-level multi-secret sharing scheme for decentralized e-voting in cloud computing

作者: Jing Li , Xianmin Wang , Zhengan Huang , Licheng Wang , Yang Xiang

DOI: 10.1016/J.JPDC.2019.04.003

关键词:

摘要: … In 1991, the first threshold secret sharing scheme without the assistance of any … multi-secret sharing scheme based on multi-target MSP. The scheme does not require any trusted center, …

参考文章(30)
Yi-Shiung Yeh, Han-Yu Lin, Dynamic Multi-Secret Sharing Scheme ,(2008)
Josh Cohen Benaloh, Secret sharing homomorphisms: keeping shares of a secret secret international cryptology conference. pp. 251- 260 ,(1987)
Jiang Zhang, Zhenfeng Zhang, Secure and efficient data-sharing in clouds Concurrency and Computation: Practice and Experience. ,vol. 27, pp. 2125- 2143 ,(2015) , 10.1002/CPE.3395
Ching-Fang Hsu, Qi Cheng, Xueming Tang, Bing Zeng, An ideal multi-secret sharing scheme based on MSP Information Sciences. ,vol. 181, pp. 1403- 1409 ,(2011) , 10.1016/J.INS.2010.11.032
M HADIANDEHKORDI, S MASHHADI, New efficient and practical verifiable multi-secret sharing schemes Information Sciences. ,vol. 178, pp. 2262- 2274 ,(2008) , 10.1016/J.INS.2007.11.031
Massoud Hadian Dehkordi, Samaneh Mashhadi, Verifiable secret sharing schemes based on non-homogeneous linear recursions and elliptic curves Computer Communications. ,vol. 31, pp. 1777- 1784 ,(2008) , 10.1016/J.COMCOM.2007.11.014
Massoud Hadian Dehkordi, Samaneh Mashhadi, An efficient threshold verifiable multi-secret sharing Computer Standards & Interfaces. ,vol. 30, pp. 187- 190 ,(2008) , 10.1016/J.CSI.2007.08.004
Angsuman Das, Avishek Adhikari, An efficient multi-use multi-secret sharing scheme based on hash function Applied Mathematics Letters. ,vol. 23, pp. 993- 996 ,(2010) , 10.1016/J.AML.2010.04.024
Mitsuru Ito, Akira Saito, Takao Nishizeki, Secret sharing scheme realizing general access structure Electronics and Communications in Japan Part Iii-fundamental Electronic Science. ,vol. 72, pp. 56- 64 ,(1989) , 10.1002/ECJC.4430720906
Josh Benaloh, Jerry Leichter, Generalized secret sharing and monotone functions international cryptology conference. pp. 27- 35 ,(1990) , 10.1007/0-387-34799-2_3